A collection of notes for Penetration Testers and Ethical Hackers. My journey to OSCP and beyond.
If you would like to add to, modify, or improve anything in my notes, PLEASE DO!
If you would like to give suggestions or even commit changes to these pages feel free to head to my GitHub page at:
- 3.Push some code to your fork.
- 5.After reviewing your changes, I will merge your pull request to the master repository.
- 6.Make sure to update your Issue Request so that I can credit you! Thank you so much!
Feel free to also open an issue with any questions, help wanted, or requests! Throughout these notes I have put
TODO:notes that indicate that I know a certain section needs work. Focus on these if you can!
TODO: Change all code examples to use variables (e.g. $host_ip)
rather than fill-in-the-blank format (e.g. <host_ip>).
This will help greatly with copying code directly into scripts.
The following sub-pages of these notes will explore some of the common offensive and defensive security techniques including gaining shells, code execution, lateral movement, persistence, scripting, tools and much more. I also cover techniques for dealing with CTF-type challenges such as cryptography, reverse engineering, steganography and more.